Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2023 05:39

General

  • Target

    13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe

  • Size

    347KB

  • MD5

    960f9112b687fc805cc7d6483ec60a14

  • SHA1

    a4f965d227bdc79f49e09172f27e4e647e065a05

  • SHA256

    13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4

  • SHA512

    a1b8ef63d87f6a41627258297ab8da91e4d7efafb83220d03ce8046c7142c641f14e118483652a830b44c441af4eba668352860eae51994efff9fed84c13de57

  • SSDEEP

    6144:5kO+mGx363FXS+3oYU9IML4ChRJX6Tf1AR+O+v0NaRH:5pcRkFih9IMkC9qxr0NC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe
    "C:\Users\Admin\AppData\Local\Temp\13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im "13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im "13c6577c68731d9e93655897eecd39234af0eee76ba36844c8e57421c7a191d4.exe" /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1420
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 1360
      2⤵
      • Program crash
      PID:1872
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4936 -ip 4936
    1⤵
      PID:4564
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:3996
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:460

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/460-43-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/460-74-0x00000201E3460000-0x00000201E3461000-memory.dmp

        Filesize

        4KB

      • memory/460-44-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/460-73-0x00000201E3350000-0x00000201E3351000-memory.dmp

        Filesize

        4KB

      • memory/460-72-0x00000201E3350000-0x00000201E3351000-memory.dmp

        Filesize

        4KB

      • memory/460-6-0x00000201DAF40000-0x00000201DAF50000-memory.dmp

        Filesize

        64KB

      • memory/460-22-0x00000201DB040000-0x00000201DB050000-memory.dmp

        Filesize

        64KB

      • memory/460-38-0x00000201E35C0000-0x00000201E35C1000-memory.dmp

        Filesize

        4KB

      • memory/460-39-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/460-40-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/460-41-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/460-42-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/460-70-0x00000201E3340000-0x00000201E3341000-memory.dmp

        Filesize

        4KB

      • memory/460-58-0x00000201E3140000-0x00000201E3141000-memory.dmp

        Filesize

        4KB

      • memory/460-55-0x00000201E3200000-0x00000201E3201000-memory.dmp

        Filesize

        4KB

      • memory/460-46-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/460-47-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/460-48-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/460-49-0x00000201E3210000-0x00000201E3211000-memory.dmp

        Filesize

        4KB

      • memory/460-50-0x00000201E3200000-0x00000201E3201000-memory.dmp

        Filesize

        4KB

      • memory/460-52-0x00000201E3210000-0x00000201E3211000-memory.dmp

        Filesize

        4KB

      • memory/460-45-0x00000201E35F0000-0x00000201E35F1000-memory.dmp

        Filesize

        4KB

      • memory/4936-2-0x0000000000610000-0x000000000063A000-memory.dmp

        Filesize

        168KB

      • memory/4936-3-0x0000000000400000-0x0000000000498000-memory.dmp

        Filesize

        608KB

      • memory/4936-5-0x0000000000610000-0x000000000063A000-memory.dmp

        Filesize

        168KB

      • memory/4936-4-0x0000000000400000-0x0000000000498000-memory.dmp

        Filesize

        608KB

      • memory/4936-1-0x00000000006A0000-0x00000000007A0000-memory.dmp

        Filesize

        1024KB